project powerpoint
TRANSCRIPT
KENYATTA UNIVERSITY
SCHOOL OF ENGINEERING AND TECHNOLOGY
ELECTRICAL AND ELECTRONICS DEPARTMENT
PROJECT TITLE: ACCESS CONTROL AND AUTHENTICATION USING RFID AND FINGERPRINT
NAME: SIMON CHEGE
REG. NO.: J174/1706/2011
SUPERVISOR: A. MBUGUA
• System components: microcontroller, RFID reader, Fingerprint scanner and LCD.• Application: Industries, Companies and Offices• Features measured: face, fingerprints, hand geometry, handwriting,
iris, retinal, vein, and voice. • Algorithm cannot be reconverted to an image, so no one can’t
duplicate your fingerprints.
INTRODUCTION & BACKGROUND OVERVIEW
PROBLEM STATEMENT & JUSTIFICATION• Security is a matter of concern to every company or public sector• Check:
What you haveWhat you knowWho you are
• unique, physical attributeharder to fake.You can't guess. You can't misplace. You can't forget.
OBJECTIVES
• Main objective: Combine the “what you have” and “who you are” concept.• The specific objectives include:
User friendly systemAuthenticate and validate access
LITERATURE REVIEW
• [3] presents a radio-frequency identification (RFID)-enabled traceability system for the management of consignment and high value products requiring item level traceability in a hospital environment. • An Ambient Intelligence platform, NIGHT Care, for remote monitoring
and control of overnight living environment is proposed by Cecilia in their paper [4]
METHODOLOGY
• BLOCK DIAGRAM
GSM MODEM
FINGERPRINT SCANNER
RFID READER
RFID TAG
POWER SUPPLY
DC MOTORDRIVER AND RELAY UNIT
LCD DISPLAYMICRO CONTROLLER
IMPLEMENTATION AND OBSERVATION• INVALD TAG
IMPLEMENTATION AND OBSERVATION• VALD TAG
RESULTS ANALYSIS• Invalid tags: Message display, Tag number, door closed, initialize
system.• Valid tags: message display, Tag number, Owner, Door open, warning
timeout, door close• Idle: door closed
CONCLUSION AND RECOMMENDATION• CONCLUSIONThe system can be used in wide applications for verification, validation and authentication of use of different facilities.
• RECOMMENDATIONThe system can be improved if higher level of security is required by using GSM for monitoring.The Fingerprint part can be implemented later when the right hardware is available.
END